This content has been archived. It is available exclusively through our partner LexisNexis®.

To view this content, please continue to Lexis Advance®.

LexisNexis® is now the exclusive third party online distributor of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® customers will be able to access and use ALM's content by subscribing to the LexisNexis® services via Lexis Advance®. This includes content from the National Law Journal®, The American Lawyer®, Law Technology News®, The New York Law Journal® and Corporate Counsel®, as well as ALM's other newspapers, directories, legal treatises, published and unpublished court opinions, and other sources of legal information.

ALM's content plays a significant role in your work and research, and now through this alliance LexisNexis® will bring you access to an even more comprehensive collection of legal content.

What's being said

The most essential attributes of security are trustworthiness, protection, and resilience. Security is defined as the condition of being protected against danger or loss. Software assurance is the level of confidence that software is free from vulnerabilities. It involves trustworthiness and no exploitable vulnerability, justifiable confidence in predictable execution, and conformance through planned and systematic multidisciplinary activities.

Simply put, the goal of Cyber Security is to assure the trustworthiness, security, and resiliency of software components, systems, and systems of systems of all kinds including those used in national defense and the nation’s critical infrastructure. Resiliency is the ability to anticipate, avoid, withstand, mitigate, and recover from the effects of adversity whether natural or manmade under all circumstances of use.

Issues surrounding security include:1. The Cyber Security gap between complete correctness and sufficient correctness continues to grow and with it the opportunities for adversarial exploitation. Closing the gap requires behavior computation, the net effect of program operations spanning all possible behaviors where the preferred outcome is full behavior nothing more.2. Cyber Security foundations are lacking; 3. Cyber Security practice is ad hoc, not well understood, and ineffective; 4. Cyber Security training and certification programs do not yield the capability to secure large scale software intensive systems; 5. Research programs are misdirected and promise what they cannot deliver; 6. STEM initiatives cannot deliver results needed; 7. Executives and senior managers are disconnected from the realities they face; 8. Privacy, civil liberties, information sharing liability concerns represent increasing resistance and barriers to achieving Cyber Security.

Under One Agile UmbrellaFinancial institutions are challenged to meet compliance obligations in a more cost-effective and agile way. Find out how to integrate your existing compliance programs under one unified umbrella.

Compliance and Conflicts of InterestAlthough every company is different from a culture and risk tolerance perspective, this White Paper contains a checklist for every corporate compliance function to follow.

2016 Regulation Review and 2017 PreviewAs 2016 comes to an end, the financial services industry is facing an increasingly vigilant regulatory landscape. This white Paper examines the key trends to watch in the new year. Learn more now!